SendSafely Features
Security (4)
Encrypted Storage
Provides some level of encryption of files and data in transit and sensitive information while it lives online.
Anomoly Detection
Constantly monitors acivity related to user behavior and compares activity to benchmarked patterns.
Data loss Prevention
Stores data securely either on premise or in an adjacent cloud database to prevent loss of data at rest.
Policy Enforcement
Allows administrators to set policies for security and data governance.
Administration (3)
Reporting and Monitoring
Access pre-built and custom reports to monitor user activity and storage.
Breadth of Partner Applications
To what extent are there partner applications readily available for integrating into this product? Partner applications typically provide complementary, best of breed functionality not offered natively in this product.
Auditing
Documents access and alterations of the database for analytics and reporting.
Access Control (4)
User, Role, and Access Management
Allows administrators to provision access based on the individual user and their role.
Access Rights
Defines which users have access to the different modules of the software and how.
User Analytics
Allows for reporting and documentation of individual user behavior and privileges.
Compliance Monitoring
Monitors data quality and send alerts based on violations or misuse.
Encryption Techniques - Email Encryption (3)
Encryption Algorithms
Supports various encryption algorithms including AES (Advanced Encryption Standard), RSA (Rivest-Shamir-Adleman), Twofish, and Pretty Good Privacy (PGP).
Transport Encryption
Encrypts the email during transit between email servers, preventing interception by third parties.
End-to-End Encryption
Encrypts the message on the sender's device and decrypts it only on the recipient's device, ensuring that only the sender and recipient can read it.
Authentication, Verification, and Access Controls - Email Encryption (4)
Revocation Mechanisms
Allows users to revoke access to encrypted emails or keys in case of compromise.
Access Controls
Enables users to set permissions on who can access, read, or modify their encrypted emails.
Digital Signatures
Allows senders to sign their emails cryptographically, providing proof of authenticity and integrity.
Certificate Authorities
Verifies the identities of individuals or organizations through trusted third-party certificate authorities.
Security Enhancements and Auditing - Email Encryption (4)
Malware Scanning
Integrates with antivirus solutions to scan email attachments for malicious content.
Reporting
Generates reports on encryption usage, compliance status, and security incidents.
Audit Trails
Logs and tracks encryption-related activities for compliance, troubleshooting, and security analysis.
Data Loss Prevention (DLP)
Offers DLP features to prevent accidental or unauthorized transmission of sensitive information.
Integration, Compatibility, and Usability - Email Encryption (4)
User-Friendly Interfaces
Offers intuitive interfaces for sending, receiving, and managing encrypted emails.
APIs and SDKs
Offers application programming interface (APIs) and software development kits (SDKs) for integrating encryption features into custom applications or workflows.
Email Client Integration
Integrates seamlessly with popular email clients, including Gmail, Microsoft Outlook, and Thunderbird.
Automation
Automatically performs encryption and decryption processes to minimize user effort and errors.





